최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.24 no.5, 2020년, pp.567 - 575
정시현 (Department of Computer and Engineering, Seoul University) , 오하영 (Global Convergence, Sungkyunkwan University)
As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing stra...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. "COMPA: Detecting Compromised Accounts on Social Networks." NDSS. 2013.
G. Magno, T. Rodrigues, V. Augusto, and F. Almeida. "Detecting spammers on twitter. In Collaboration, Electronic messaging", Anti-Abuse and Spam Conference (CEAS), 2010.
J. M. Romo and L. Araujo. "Detecting malicious tweets in trending topics using a statistical analysis of language". Expert Systems with Applications 40.8, 2013
S. Y. Schoenebeck, D. M. Romero, G. Schoenebeck, and D. Boyd. "Detecting spam in a twitter network." First Monday, 15(1), January, 2009.
X. Li, M. Zhang, Y. Liu, S. Ma, Y. Jin, and L. Ru. "Search engine click spam detection based on bipartite graph propagation." Proceedings of the 7th ACM international conference on Web search and data mining. ACM, 2014.
T. Tian, J. Zhu, F. Xia, X. Zhuang, and T. Zhang. "Crowd fraud detection in internet advertising." Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015.
Q. Cao, X. Yang, J. Yu, and C. Palow. "Uncovering large groups of active malicious accounts in online social networks." Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014.
Q. Cao, X. Yang, J. Yu, and C. Palow. "VolTime: Unsupervised Anomaly Detection on Users' Online Activity Volume." Proceedings of the 2017 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2017.
L. H. Yu, and D.Y. Yeung. "A learning approach to spam detection based on social networks". Diss. Hong Kong University of Science and Technology, 2007
I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F.Bonchi. "The social world of content abusers in community question answering." Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015.
E. Zhai, Z. Li, Z. Li, F. Wu, and G. Chen. "Resisting tag spam by leveraging implicit user behaviors." Proceedings of the VLDB Endowment 10.3 (2016): 241-252.
H. Zheng, M. Xue, H. Lu, S. Hao, H. Zhu, X. Liang, and K. W. Ross "Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks." arXiv preprint arXiv:1709.06916 (2017).
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang "Inferring strange behavior from connectivity pattern in social networks." Advances in Knowledge Discovery and Data Mining. Springer International Publishing, 2014. 126-138.
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. "CatchSync: catching synchronized behavior in large directed graphs." Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2014.
M. Newman,. Networks. Oxford university press, 2018.
L. Akoglu, M. McGlohon, and C. Faloutsos. "Oddball: Spotting anomalies in weighted graphs." Advances in Knowledge Discovery and Data Mining. Springer Berlin Heidelberg, 2010. 410-421.
D. O'Callaghan, M. Harrigan, J. Carthy, and P. Cunningham." Network Analysis of Recurring YouTube Spam Campaigns." ICWSM. 2012.
S. Jeong, G. Noh, H. Oh, and C. Kim. "Follow spam detection based on cascaded social information." Information Sciences 369 (2016): 481-499.
N. Z. Gong, M. Frank, and P. Mittal. "SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection." Information Forensics and Security, IEEE Transactions on 9.6 (2014): 976-987.
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. "Understanding and combating link farming in the twitter social network." Proceedings of the 21st international conference on World Wide Web. ACM, 2012.
D. Yuan, G. Li, Q. Li, and Y. Zheng. "Sybil defense in crowdsourcing platforms." Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 2017.
N. Shah, A. Beutel, B. Gallagher, and C. Faloutsos. "Spotting suspicious link behavior with fBox: an adversarial perspective." Data Mining (ICDM), 2014 IEEE International Conference on. IEEE, 2014.
A. Beutel, K. Murray, C. Faloutsos, and A. J. Smola. "Cobafi: collaborative bayesian filtering." Proceedings of the 23rd international conference on World wide web. ACM, 2014.
M. Gupta, J. Gao, and J. Han. "Community distribution outlier detection in heterogeneous information networks." Machine Learning and Knowledge Discovery in Databases. Springer Berlin Heidelberg, 2013. 557-573.
B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. "Towards detecting anomalous user behavior in online social networks." Proceedings of the 23rd USENIX Security Symposium (USENIX Security). 2014.
I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F. Bonchi. "The Social World of Content Abusers in Community Question Answering." Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015.
B. Perozzi, and L. Akoglu. "Scalable anomaly ranking of attributed neighborhoods." Proceedings of the 2016 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2016.
S. Dhawan, S. C. R. Gangireddy, S. Kumar, and T. Chakraborty. 2019. "Spotting collective behaviour of online frauds in customer reviews." In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19), Sarit Kraus (Ed.). AAAI Press 245-251.
S. Jeong, J. Lee, J. Park, and C. Kim. "The Social Relation Key: A new paradigm for security." Information Systems 71 (2017): 68-77.
M. McPherson, L. S. Lovin, and J. M. Cook. "Birds of a feather: Homophily in social networks." Annual review of sociology 27.1 (2001): 415-444.
R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. S. Orr, I. Ayzenshtat, M. Sheffer, and U. Alon. "Superfamilies of evolved and designed networks." Science 303.5663 (2004): 1538-1542.
O. N. Yaveroglu, N. M. Dognin, D. Davis, Z. Levnajic, V. Janjic, R. Karapandza, A. Stojmirovic, and N. Przulj. "Revealing the hidden language of complex networks." Scientific reports 4 (2014).
Y. Koren, "Collaborative filtering with temporal dynamics." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009.
R. Salakhutdinov, and A. Mnih. "Bayesian probabilistic matrix factorization using Markov chain Monte Carlo." Proceedings of the 25th international conference on Machine learning. ACM, 2008.
L.Page, S. Brin, R. Motwani, and T. Winograd. "The PageRank citation ranking: Bringing order to the web." Stanford InfoLab, 1999.
J. Kleinberg, "Hubs, authorities, and communities." ACM computing surveys (CSUR) 31.4es (1999): 5.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.